From the course: Cybersecurity Awareness: Phishing Attacks

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Other notable methods of phishing

Other notable methods of phishing

- [Narrator] At this point, I've talked about being phished by email, phone, social media, and text message. There are so many ways to phish a person, and they won't all fit into this course. But before we move on, I want to highlight some other phishing methods that you may come across in the future. In traditional fishing, you'd use a lure as bait. It works the same way in the type of phishing we discuss in this course, but there are some phishing attacks that do not require the use of a lure. An example of this is pharming. Pharming doesn't require a lure because you've either already been susceptible to the lure by this point or this was done without any involvement from you at all. Pharming occurs when malicious code that causes people to be redirected to a malicious website is installed on a computer or a server. Sometimes pharming is done by a change made to the host file on a computer. Host files exist for a…

Contents